04-27-2019
Normally I have no problem with installation as I did the same before but it was a question in my mind.
My question: What is the function of the line which I removed?
Thank you
Boris
8 More Discussions You Might Find Interesting
1. Red Hat
Hello,
Our production linux server have multiple network interface.
Recently we installed and started NFS. Now the client server cannot mount to the server running NFS.
Later it was discovered that the port being used for NFS is only bound to one IP address, which is not the IP address I... (0 Replies)
Discussion started by: hemangjani
0 Replies
2. Cybersecurity
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (0 Replies)
Discussion started by: noufel
0 Replies
3. OS X (Apple)
Hi All
*
Need some help on testing if a server supports weak ciphers .
Here is the command I ran :
openssl s_client -connect HOSTNAME:443 -cipher LOW:EXP
result :
Connected : err num=110
openssl s_client -connect HOSTNAME:8000 -cipher LOW:EXP
result :
Connected : err... (1 Reply)
Discussion started by: noufel
1 Replies
4. Cybersecurity
Hello,
I recently had a Retina scan of my system and there are some findings I do not understand.
SSL Week Cipher Strength Supported - Retina has detected that the targeted SSL Service supports a cryptographically weak cipher strength... Disable ciphers that support less than 128-bit... (4 Replies)
Discussion started by: stringman
4 Replies
5. Cybersecurity
Hello,
One of my co-worker changed our the ssh ciphers that we currently use.
We made a change to /etc/ssh/ssh_config on our Solaris 10 servers. Security said that we have to use aes128-ctr or higher, but not aes128-cbc.
The issue is that many of the ssh clients (Tectia) on Windows will not... (0 Replies)
Discussion started by: bitlord
0 Replies
6. UNIX for Dummies Questions & Answers
When you get the message can't bind to ip already in use.
is there a command to search to see everything that is using that IP?
I've already check the host and hostname files (2 Replies)
Discussion started by: mchelle_99
2 Replies
7. Linux
I try to enable only secure high ciphers.
With those
smtpd_tls_auth_only = yes
smtpd_tls_mandatory_ciphers = high
smtpd_tls_protocols = SSLv3, TLSv1, !SSLv2
smtpd_tls_mandatory_exclude_ciphers = aNULL
Disable sslv2 but nessus say weak and medium ciphers
still enabled,how to enable only... (0 Replies)
Discussion started by: Linusolaradm1
0 Replies
8. UNIX for Advanced & Expert Users
Hi All
I need to do bind of exiting filesystem to new storage allocated
mount --bind /prod/OpenCSS /var/lib/test
echo "/prod/OpenCSS /var/lib/pgsql bind bind 0 0" >> /etc/fstab
will this command just work ? (2 Replies)
Discussion started by: anil529
2 Replies
INTRO(9) BSD Kernel Developer's Manual INTRO(9)
NAME
intro -- introduction to system kernel interfaces
DESCRIPTION
This section contains information about the interfaces and subroutines in the kernel.
PROTOTYPES ANSI-C AND ALL THAT
Yes please.
We would like all code to be fully prototyped.
If your code compiles cleanly with cc -Wall we would feel happy about it. It is important to understand that this isn't a question of just
shutting up cc, it is a question about avoiding the things it complains about. To put it bluntly, don't hide the problem by casting and
other obfuscating practices, solve the problem.
INDENTATION AND STYLE
Believe it or not, there actually exists a guide for indentation and style. It isn't generally applied though.
We would appreciate if people would pay attention to it, and at least not violate it blatantly.
We don't mind it too badly if you have your own style, but please make sure we can read it too.
Please take time to read style(9) for more information.
NAMING THINGS
Some general rules exist:
1. If a function is meant as a debugging aid in DDB, it should be enclosed in
#ifdef DDB
#endif /* DDB */
And the name of the procedure should start with the prefix DDB_ to clearly identify the procedure as a debugger routine.
SCOPE OF SYMBOLS
It is important to carefully consider the scope of symbols in the kernel. The default is to make everything static, unless some reason
requires the opposite.
There are several reasons for this policy, the main one is that the kernel is one monolithic name-space, and pollution is not a good idea
here either.
For device drivers and other modules that don't add new internal interfaces to the kernel, the entire source should be in one file if possi-
ble. That way all symbols can be made static.
If for some reason a module is split over multiple source files, then try to split the module along some major fault-line and consider using
the number of global symbols as your guide. The fewer the better.
SEE ALSO
style(9)
HISTORY
The intro section manual page appeared in FreeBSD 2.2.
BSD
December 13, 1995 BSD